1. Alpcan, T., Basar, T.: An intrusion detection game with limited observations. In: Proc. of the 43rd IEEE Conference on Decision and Control (2004)
2. You, X., Shiyong, Z.: A kind of network security behavior model based on game theory. In: Proceedings of the Fourth International Conference on Parallel and Distributed Computing, Applications and Technologies (2003)
3. Doupé, A., Egele, M., Caillat, B., Stringhini, G., Yakin, G., Zand, A., Cavedon, L., Vigna, G.: Hit ’em where it hurts: a live security exercise on cyber situational awareness. In: Proceedings of the 27th Annual Computer Security Applications Conference, ACSAC 2011, pp. 51–61. ACM, New York (2011)
4. Aumann, R.J., Maschler, M.: Repeated Games with Incomplete Information. MIT Press (1995)
5. Jones, M., Shamma, J.S.: Policy improvement for repeated zero-sum games with asymmetric information. In: 51st IEEE Conference on Decision and Control (December 2012)